Issue32

3 posts
Issue32

Top 10 security best practices for MongoDB

Enable & configure role-based access control. Configure TLS. Restrict network exposure - ensure the instance is only listening on the localhost interface.…

Issue32

Practical tips for how to survive and thrive in the chaos of legacy software

Treat legacy software as the 3rd party software,  take its output and convert it into a form that can be consumed by a new application or a system that you’re migrating to. Change only what must be changed. Never underestimate the dependencies in legacy software.…

Issue32

How to overcome 5 common database challenges

Data Security: use the database’s built-in security features; or use what your company is already using for security purposes; or reinforce both in your application.…